openwrt/package
Eneas U de Queiroz 9ce6aa9d8d wolfssl: bump to 5.2.0
Fixes two high-severity vulnerabilities:

- CVE-2022-25640: A TLS v1.3 server who requires mutual authentication
  can be bypassed.  If a malicious client does not send the
  certificate_verify message a client can connect without presenting a
  certificate even if the server requires one.

- CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS
  v1.3 server can have its certificate heck bypassed. If the sig_algo in
  the certificate_verify message is different than the certificate
  message checking may be bypassed.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
Signed-off-by: Petr Štetiar <ynezz@true.cz> [ABI version change]
(cherry picked from commit e89f3e85eb)
(cherry picked from commit 2393b09b59)
2022-04-16 15:13:32 +02:00
..
base-files base-files: call "sync" after initial setup 2022-03-15 10:15:39 +01:00
boot uboot-lantiq: danube: fix hanging lzma kernel uncompression #2 2021-11-27 22:55:25 +01:00
devel perf: build with NO_LIBCAP=1 2020-05-05 00:05:28 +02:00
firmware wireless-regdb: update to version 2021.08.28 2021-11-07 19:49:57 +01:00
kernel mac80211: Update to version 4.19.237-1 2022-04-11 23:25:53 +02:00
libs wolfssl: bump to 5.2.0 2022-04-16 15:13:32 +02:00
network hostapd: Apply SAE/EAP-pwd side-channel attack update 2 2022-02-13 19:14:38 +01:00
system ubus: backport fixes for UAF and other issues 2022-02-21 07:41:05 +01:00
utils busybox: delete redundant patch 2020-08-12 11:10:16 +02:00
Makefile packages: apply usign padding workarounds to package indexes if needed 2019-08-07 07:22:37 +02:00